BLOG

Proventa Blog – EN2023-11-14T10:32:02+01:00
1810, 2024

Auditing in PostgreSQL (Part 2)

18-10-2024|Database|

Building on the first blog entry in the series, Auditing in PostgreSQL, it is time to extend the audit features used. This blog entry introduces the extension pgauditlogtofile, which separates the audit log trail from the default PostgreSQL log into a dedicated file. It is common practice in many companies to separate the audit [...]

1610, 2024

Auditing in PostgreSQL (Part 1)

16-10-2024|Database|

Many financial and insurance enterprises are required to comply with regulatory mandates such as the GDPR. These regulations often include auditing database access to track all activities, whether by specific individuals, such as DBAs, or general data access and manipulation. This blog series, consisting of three articles, will explore auditing in PostgreSQL. The first [...]

2709, 2024

Get Notified: Setting Up Alerts in Grafana

27-09-2024|DevOps|

If you are using Grafana to monitor your systems, you are already ahead of the game. But did you know that you can also use Grafana to set up alerts? This is a great way to get notified when something goes wrong with your systems. In this blog post, we will show you how to [...]

1709, 2024

Coordinating OS Update on Multiple Fedora CoreOS Machines

17-09-2024|DevOps|

Fedora CoreOS is a lightweight, container-focused operating system. It is designed to be updated automatically and frequently with atomic updates. This means that the entire operating system is updated as a whole. This is a great feature for keeping your system up to date and secure, but it can be a challenge to coordinate [...]

1804, 2024

SELinux: A Mandatory Part of Running a Secure PostgreSQL Database

18-04-2024|Database, DevOps|

Data is the most critical asset of any company today. There are many recommendations to secure a PostgreSQL database, e.g. CIS Benchmark for PostgreSQL, but Linux provides already one which you should not avoid: Security-Enhanced Linux (SELinux). SELinux provides access control for files, processes and applications to grant access or deny it. This security architecture [...]

Go to Top